Novell Kanaka for Mac 2.7.3 Installation and Administration Guide About This Guide

Total Page:16

File Type:pdf, Size:1020Kb

Novell Kanaka for Mac 2.7.3 Installation and Administration Guide About This Guide www.novell.com/documentation Installation and Administration Guide Novell Kanaka for Mac Version 2.7.3 November 3, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Condrey Corporation makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to make changes to any and all parts of the software at any time, without obligation to notify any person or entity of such revisions or changes. See the Software EULA for full license and warranty information with regard to the Software. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Condrey Corporation assumes no responsibility for your failure to obtain any necessary export approvals. Copyright © 2015 Condrey Corporation. All Rights Reserved. No part of this publication may be reproduced, photocopied, or transmitted in any fashion with out the express written consent of the publisher. Condrey Corporation 122 North Laurens St. Greenville, SC, 29601 U.S.A. http://condrey.co Trademarks The Condrey Corporation “C’s” logo is a trademark of Condrey Corporation in the U.S. and other jurisdictions. Mac, and Mac OS X are trademarks or registered trademarks of Apple, Inc. in the U.S. and other countries. Novell, NetWare, eDirectory, and SUSE are trademarks or registered trademarks of Novell, Inc. in the U.S. and other countries. Linux is a trademark or registered trademark of Linus Torvalds in the U.S. and other countries. For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/trademarks/ tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners. Contents About This Guide 5 1What’s New 7 1.1 New in 2.7.3 . 7 1.2 New in Version 2.7.2 . 7 1.3 New in Version 2.7 . 7 1.4 New in Version 2.6 . 8 2 Overview 9 2.1 Installers and Executables . 9 2.2 Engine . 10 2.3 Management Interface . 10 2.4 Kanaka Plug-In. 10 2.4.1 Authentication and Mounting via the Kanaka Plug-In . 11 2.4.2 Kanaka Plug-In, OS X, and Mobile Accounts . 12 2.4.3 Kanaka Plug-In Console . .12 2.5 Kanaka Desktop Client. 14 2.5.1 Authentication and Storage Mounting via the Kanaka Desktop Client. 14 2.6 Deciding Which Access Method to Use . 15 3 Prerequisites 17 3.1 Enabling Native File Access and Protocols . 17 3.2 Determining Which Protocols to Enable. 17 3.2.1 AFP . 18 3.2.2 CIFS. 18 3.3 Password Management . 18 3.4 Testing AFP or CIFS . 19 4 Installing and Configuring the Engine 21 4.1 System Requirements . 21 4.2 Installing the Kanaka Engine . 21 4.3 Configuring the Engine. 25 5 Installing the Plug-In and the Desktop Client 33 5.1 Retrieving the Installation File . 33 5.2 Installing the Kanaka Plug-In . 33 5.3 Configuring the Kanaka Plug-In . 34 5.3.1 Configuring the Kanaka Plug-In. 35 5.4 Installing the Kanaka Desktop Client . 36 Contents 3 6 Using the Kanaka Plug-In 39 7 Using the Kanaka Desktop Client 43 7.1 Authentication . 43 7.2 Storage Properties . 44 7.3 Home Directory . 45 8 eDirectory Password Expiration 47 8.1 Kanaka Plug-In. 47 8.1.1 Kanaka Plug-In Console . .48 8.2 Kanaka Desktop Client. 49 9 Migrating from Kanaka for eDirectory to Novell Kanaka for Mac 53 10 Parsing Novell Login Scripts 55 10.1 Login Script Overview . 55 10.2 Login Script Sample . 56 11 Reference 59 11.1 Storage Resources. 59 11.2 Cluster Volumes . 60 11.3 Collaborative Storage. 61 11.4 Proxy Home . 63 11.5 Policy . 64 11.5.1 User Management . 65 11.5.2 Managed Client Settings . 69 11.6 NetStorage Integration and Storage Location Objects . 71 A Documentation Updates 73 A.1 November 3, 2015 . 73 A.2 March 30, 2015 . 73 A.3 October 29, 2014 . 73 A.4 June 8, 2012 . 73 A.5 March 13, 2012 . 74 A.6 January 31, 2012 . ..
Recommended publications
  • Best Practices for Integrating OS X with Active Directory
    Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction ........................................................................................................................3 How to Integrate OS X with Active Directory .......................................................4 Enterprise Integration Challenges .............................................................................7 Deployment Strategies ..................................................................................................9 Home Directories ..............................................................................................................10 Conclusion ...........................................................................................................................11 Appendix A: More Information ....................................................................................12 Appendix B: Third-Party Add-on Solutions ............................................................13 2 Apple Technical White Paper Best Practices for Integrating OS X with Active Directory Introduction Apple’s support for Active Directory within OS X enables Mac clients and servers to integrate smoothly into existing Active Directory environments, and provides the option of deploying a single, directory services infrastructure that can support both Mac and Windows clients. Apple’s Built-in Solution Large organizations have a need to manage user identities and access across a variety
    [Show full text]
  • Open Directory Administration for Version 10.5 Leopard Second Edition
    Mac OS X Server Open Directory Administration For Version 10.5 Leopard Second Edition Apple Inc. © 2008 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to use such software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling copies of this publication or for providing paid-for support services. Every effort has been made to make sure that the information in this manual is correct. Apple Inc., is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino CA 95014-2084 www.apple.com The Apple logo is a trademark of Apple Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, iCal, iChat, Leopard, Mac, Macintosh, QuickTime, Xgrid, and Xserve are trademarks of Apple Inc., registered in the U.S. and other countries. Finder is a trademark of Apple Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. UNIX is a registered trademark of The Open Group. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • CIS Mac OS X Leopard (10.5.X) Benchmark
    Mac OS X 10.5 Leopard Level 1 & 2 Benchmark Version 1.0 May 2008 Copyright ©2008, The Center for Internet Security http://www.cisecurity.org Editor: Allan Marcus [email protected] CIS Mac OS X Leopard (10.5.x) Benchmark Table of Contents Terms of Use Agreement ........................................................................................................................... 3 1) Introduction ........................................................................................................................................ 6 1.1) Document Layout ....................................................................................................................... 6 1.2) Intended Audience ..................................................................................................................... 6 1.3) Practical Application .................................................................................................................. 7 1.4) Security Levels Explained ......................................................................................................... 7 1.5) Precursor Technical Information ............................................................................................... 7 1.6) Basic Security Principles: .......................................................................................................... 8 2) Benchmark Elements ......................................................................................................................... 9 2.1) Installation
    [Show full text]
  • Guide to Securing Apple OS X 10.10 Systems for IT Professionals: a NIST Security Configuration Checklist
    NIST Special Publication 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist Lee Badger Murugiah Souppaya Mark Trapnell Eric Trapnell Dylan Yaga Karen Scarfone This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-179 C O M P U T E R S E C U R I T Y NIST Special Publication 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist Lee Badger Murugiah Souppaya Mark Trapnell Dylan Yaga Computer Security Division Information Technology Laboratory Eric Trapnell Software and Systems Division Information Technology Laboratory Karen Scarfone Scarfone Cybersecurity Clifton, VA This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-179 December 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.
    [Show full text]
  • Semester 1 2018 - 2019
    Computer Science 2018 - 2019, Semester 1 - MAC Lab Software Semester 1 2018 - 2019 MacOS 10.11.6 El Capitan 50onPaletteServer 1.1.0 ABAssistandService 9.0 Accessibility Inspector 4.1 Activity Monitor 10.11 AddPrinter 11.4 AddressBook Manager 9.0 AddressBookSourceSync 9.0 AddressBookSync 9.0 AddressBookUrlForwarder 9.0 Adobe Flash Player Install Manager 29.0.0.113 AinuIM 1.0 AirPlayUIAgent 2.0 AirPort Base Station Agent 2.2.1 AirPort Utility 6.3.6 AirScanLegacyDiscovery 11.4 AirScanScanner 11.0 AOSAlertManager 1.07 AOSHeartbeat 1.07 AOSPushRelay 1.07 App Store 2.1 AppDownloadLauncher 1.0 AppleFileServer 2.0 AppleGraphicsWarning 2.3.0 AppleMobileDeviceHelper 5.0 AppleMobileSync 5.0 AppleScript Utility 1.1.2 Application Loader 3.5 Archive Utility 10.10 ARDAgent 3.8.5 AskPermissionUI 1.0 Assistant Audio MIDI Setup 3.0.6 AuthManager_Mac 5.0.0 Autoimporter 6.7 Automator 2.6 Automator Runner 2.6 AVB Audio Configuration 1.0 Bluetooth File Exchange 4.4.6 Bluetooth Setup Assistant 4.4.6 BluetoothUIServer 4.4.6 Boot Camp Assistant 6.0.1 Page 1 of 8 Computer Science 2018 - 2019, Semester 1 - MAC Lab Software Build Web Page 10.1 Calculator 10.8 Calendar 8.0 CalendarFileHandler 8.0 Calibration Assistant 1.0 Canon IJ Printer Utility 10.42.1 Canon IJ Printer Utility 7.27.0 Canon IJScanner2 4.0.0 Canon IJScanner4 4.0.0 Canon IJScanner6 4.0.0 Captive Network Assistant 4.1 CertificateAssistant 5.0 CharacterPalette 2.0.1 check_afp 4.0 Chess 3.13 ChineseTextConverterService 2.1 CIMFindInputCodeTool
    [Show full text]
  • List of Versions Added in ARL #2588
    List of versions added in ARL #2588 Publisher Product Version 1E Nomad Branch 7.0 45RPM software MailRaider 3.60 45RPM software MailRaider 3.22 Acesoft Tracks Eraser Pro 8.7 Acqualia Software Soulver 3.4 activePDF activePDF Toolkit 7.1 Acuant Software Developers Kit 10.08 Adlice Software RogueKiller 12.1 Adlice Software RogueKiller 13.1 Adobe Creative Cloud Desktop Application 5.4 Adobe Flash Player PPAPI 34.0 Adobe UXP Developer Tool Unspecified Adobe Experience Manager forms 10.0 Aide CAD Systems Aide PDF to DXF Converter 10.0 ALK Technologies PC*MILER|Rail 23.0 ALK Technologies PC*MILER|Rail 24.0 ALK Technologies PC*MILER|Rail 25.0 ALK Technologies PC*MILER|Rail 26.0 Alsoft DiskWarrior 5.2 Altium Designer SOLIDWORKS 2.1 Altus Group ARGUS Developer Unspecified Amazon system-release 2 Amazon man-pages 3.5 Amazon ed 3.1 Amazon pcre2 8.3 Andreas Hegenberg BetterTouchTool 3.400 Andritz IDEAS 6.5 Antibody Software WizTree 3.3 aONe Keka 1.2 Apache Software Foundation Hive Metastore Unspecified Apple CFNetwork 902.1 Apple CFNetwork 902.3 Apple Scripting Bridge 1.3 Apple System Image Utility 10.13 Apple CalendarUI 14.6 Apple Ruby for Mac 10.5 Apple Xcode 12.0 Apple AirPort Utility 17.0 Apple Xcode 11.7 Apple Xcode 12.3 Apple Directory Utility for Mac 5.0 Apple Pages Mobile 10 Apple iMovie 10.2 Apple Compressor 4.5 Apple PhotosUI 1.0 Apple WebKit 136 Apple WebKit 146 Applied Computer Services Timer Pro NET 19.0 ARES PRISM PRISM G2 45.1 Aspect Software Prophecy platform 20.0 Aspect Software Workforce Management Advanced Modules 18.2 Aspect Software
    [Show full text]
  • Meeting Tips 2018-11-11
    QuickTips November 14, 2018 Screen Shot Changes CMD + Shift + 3 Capture full screen; hold for 5 seconds CMD + Shift + 4 Capture a region; hold for 5 seconds CMD + Shift + 5 Capture full screen, window, region; hold for editing • Mark up your screen shots using tools previously only available in Preview. • Markup tools available using Quick Actions in the Finder Using Quick Actions In Mojave, Quick Actions are added below the preview of the selected file in the right sidebar. Actions will vary depending on the file and the app used to edit it. Enable Quick Actions in the Finder • Open a Finder window: select View > Show Preview (Shift-Command-P) Examples • PDF files • Images (jpg, png, etc.) • Video and audio files You can create custom Quick Actions using the Automator app. Using Notes App Improved over last several years • Create folders and subfolders • Add images, PDFs, videos, audio files • Sort, pin, password-protect notes • Share notes • Sync with all devices using iCloud • Scan documents (iOS) • Add pictures, videos (iOS) Contents Current Activities • To do lists, shopping lists, medical records, recipes, maps, temporary notes, etc. Personal Knowledge Library • Digital Asset Inventory -- account login and access information • Personal Records -- financial, health, important docs, home, receipts • Planning -- projects, travel • Reference Library -- product manuals, technical information • Genealogy files Utilities (Macintosh HD > Applications > Utilities) • Activity Monitor.app • Disk Utility.app • Adobe Flash Player Install • Grapher.app
    [Show full text]
  • Mac in the Enterprise IT Configuration Guide for Your Mac Evaluation and Deployment
    SAMPLE PAGES Mac in the Enterprise IT Configuration Guide For Your Mac Evaluation and Deployment (Version 5.0) IT Configuration Guide—For Your Mac Evaluation and Deployment (Version 5.0) SAMPLE PAGES Table of Contents Introduction .......................................................................................1 1 Imaging ..................................................................................2 1.1 Imaging Mac Computers ............................................................................................2 1.2 Creating Packages ..........................................................................................................3 1.2.1 Creating Packages with PackageMaker ................................................................4 1.2.1.1 Creating a Snapshot Package with PackageMaker ........................................10 1.2.2 Creating Packages Using Third-Party Utilities ..................................................16 1.3 Creating Images with System Image Utility .....................................................17 1.3.1 NetInstall from Installer .............................................................................................18 1.3.2 NetRestore from Installer .........................................................................................21 1.3.3 Using NetRestore from a Prepared Volume ......................................................24 1.3.4 Creating NetRestore NetBoot Sets .......................................................................27 1.3.5 Automations
    [Show full text]
  • TURING SOFTWARE Note: Turing-PC Is a Dual-Boot Windows 7 and Windows XP Machine. Turing-PC
    TURING SOFTWARE Note: Turing-PC is a Dual-Boot Windows 7 and Windows XP machine. Turing-PC (Windows 7) Turing-PC (Windows XP) Turing-Macmini Turing-PC as of 4/19/12 5:45 PM (DUAL BOOT: WINDOWS XP and WINDOWS 7) WINDOWS 7 SOFTWARE ==================== Commonly Used Programs: - Microsoft Office 2010 (Word, Excel, PowerPoint, Access) - Adobe Reader X - NotePad ++ - FireFox 3.6 - Internet Explorer 9 Complete List: Adobe Reader X (10.1.2) Ver: 10.1.2 Installed: 3/2/2012 Apple Application Support Ver: 2.0.1 Installed: 8/12/2011 Apple Software Update Ver: 2.1.3.127 Installed: 8/12/2011 Definition Update for Microsoft Office 2010 (KB982726) 32-Bit Edition Google Toolbar for Internet Explorer Ver: 1.0.0 Installed: 3/24/2010 Google Toolbar for Internet Explorer Ver: 7.3.2710.138 Google Update Helper Ver: 1.3.21.111 Installed: 3/30/2012 Installed Program Printer 1.5.0 InstEd 1.5.12.21 Ver: 1.5.12.21 Installed: 5/13/2011 Java Auto Updater Ver: 2.0.6.1 Installed: 9/28/2011 Java(TM) 6 Update 27 Ver: 6.0.270 Installed: 9/28/2011 Juniper Networks Network Connect 7.0.0 Ver: 7.0.0.17289 Microsoft Office Access MUI (English) 2010 Ver: 14.0.6029.1000 Installed: 1/27/2012 Microsoft Office Access Setup Metadata MUI (English) 2010 Ver: 14.0.6029.1000 Installed: 1/27/2012 Microsoft Office Excel MUI (English) 2010 Ver: 14.0.6029.1000 Installed: 1/27/2012 Microsoft Office Groove MUI (English) 2010 Ver: 14.0.6029.1000 Installed: 1/27/2012 Microsoft Office InfoPath MUI (English) 2010 Ver: 14.0.6029.1000 Installed: 1/27/2012 Microsoft Office OneNote MUI (English) 2010 Ver:
    [Show full text]
  • Extremez-IP 7.0 User Manual
    FILE & PRINT SERVER VERSION 7 User Manual GroupLogic, Inc. 1.703.528.1555 Email: [email protected] Web: www.grouplogic.com ExtremeZ-IP User Manual Copyright ©2011 GroupLogic, Incorporated, including this documentation, and any software and its file formats and audiovisual displays described herein; all rights reserved; may be used only pursuant to the applicable software license agreement; contains confidential and proprietary information of GroupLogic and/or other third parties which is protected by copyright, trade secret and trademark law and may not be provided or otherwise made available without prior written authorization. Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subdivision (c)(1)(ii) of the rights in technical data and computer software clause at DFARS 252.227-7013. Unpublished rights are reserved under the copyright laws of the United States. Notice The information and the software discussed in this document are subject to change without notice and should not be considered commitments by GroupLogic, Incorporated. GroupLogic, Incorporated assumes no responsibility for any errors in this document. The software discussed in this document is furnished under a license and may be used or copied only in accordance with the terms of the license. No responsibility is assumed by GroupLogic, Incorporated for the use or reliability of software on equipment that is not supplied by GroupLogic or its affiliated companies. All warranties given by GroupLogic, Incorporated about equipment or software are set forth in your purchase contract, and nothing stated in, or implied by, this document or its contents shall be considered or deemed a modification or amendment of such warranties.
    [Show full text]
  • IT Configuration Guide for Your Mac Evaluation
    SAMPLE PAGES IT Configuration Guide For Your Mac Evaluation (Version 4.0) IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES Table of Contents Introduction .......................................................................................1 1 Imaging ...............................................................................2 1.1 Imaging Mac Computers ........................................................................................2 1.2 Creating Packages .....................................................................................................3 1.2.1 Creating Packages with PackageMaker ............................................................4 1.2.1.1 Creating a Snapshot Package with PackageMaker ......................................8 1.2.2 Creating Packages with Third-Party Utilities ................................................15 1.3 Creating Images with System Image Utility ................................................16 1.3.1 NetInstall from Installer ........................................................................................17 1.3.2 NetRestore from Installer .....................................................................................20 1.3.3 Using NetRestore from a Prepared Volume .................................................23 1.3.4 Creating NetRestore NetBoot Sets ...................................................................26 1.3.5 Automations with System Image Utility .......................................................29 1.3.5.1 Creating
    [Show full text]